Skip to content
Snippets Groups Projects
Select Git revision
  • df0626a6f92edbf8ab40178c911af100f2e8d158
  • master default protected
  • hsh_v4.5
  • hsh_v4-4
  • hsh_v4.4
  • hsh_v4.3
  • hsh_v4.1.x
  • hsh_v4.2
  • hsh_v4.1
  • hsh_v3.11
  • hsh_3.10
  • v3.11-r2-hsh
  • v3.11-r2
  • v3.11-r1
  • v3.10-r1
  • v3.9-r1
  • v3.8-r2
  • v3.8-r1
  • v3.7-r1
19 results

workflowsettings.php

Blame
  • spfmilter.cfg 870 B
    [milter]
    # The socket used to communicate with sendmail
    socketname = /var/run/milter/spfmiltersock
    # Name of the milter given to sendmail
    name = pyspffilter
    # Trusted relays such as secondary MXes that should not have SPF checked.
    ;trusted_relay =
    # Internal networks that should not have SPF checked.
    internal_connect = 127.0.0.1,192.168.0.0/16,10.0.0.0/8
    
    # See http://www.openspf.com for more info on SPF.
    [spf]
    # Use sendmail access map or similar format for detailed spf policy.
    # SPF entries in the access map will override defaults.
    access_file = /etc/mail/access.db
    # Connections that get an SPF pass for a pretend MAIL FROM of 
    # postmaster@sometrustedforwarder.com skip SPF checks for the real MAIL FROM.
    # This is for non-SRS forwarders.  It is a simple implementation that
    # is inefficient for more than a few entries.
    ;trusted_forwarder = careerbuilder.com